Impact
An unauthenticated attacker can send a specially crafted POST request containing an excessively long scope parameter to Keycloak’s OpenID Connect token endpoint. The key server consumes excessive CPU and memory while parsing the parameter, causing prolonged processing times and eventually rendering the service unresponsive. This denial of service can impact all clients relying on the token endpoint for authentication.
Affected Systems
The vulnerability affects Red Hat builds of Keycloak 26.2, including the 26.2.15 update, and Red Hat builds of Keycloak 26.4, including the 26.4.11 update, all running on Red Hat Enterprise Linux 9.
Risk and Exploitability
The published CVSS score of 7.5 indicates a high severity risk level, while the EPSS score is not available and the issue is not listed in the CISA KEV catalog. Attackers can exploit the flaw remotely from any external network that can reach the exposed token endpoint, without needing authentication. No official workaround exists, making the only effective mitigation the application of vendor patches.
OpenCVE Enrichment
Github GHSA